General
-
Target
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c.bin
-
Size
749KB
-
Sample
250212-1x6j4szjdx
-
MD5
61abc8011036dea5a183161853e9bb64
-
SHA1
d333c417999fcc00411c6fbe615437597067fe72
-
SHA256
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c
-
SHA512
f0c9329640a130a7b480d5dc3c02da8031b90e5c31c2996ac7dbfcccbf042a00e927458edda9b46aaaec6043d16d4a41b1e1876ba51d7fcc428886101218da6b
-
SSDEEP
12288:j7Zka1a8Lde/3ADOizU5WmpYshXZPbGwidNpg57:j7qa1a6e/mOizU5WmD9idNpO
Behavioral task
behavioral1
Sample
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
95.181.70.232:7777
Targets
-
-
Target
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c.bin
-
Size
749KB
-
MD5
61abc8011036dea5a183161853e9bb64
-
SHA1
d333c417999fcc00411c6fbe615437597067fe72
-
SHA256
0f864e321dc7b94307069928c160b4e9cc0d3b5284e3a5f87e69aaa918ef9d1c
-
SHA512
f0c9329640a130a7b480d5dc3c02da8031b90e5c31c2996ac7dbfcccbf042a00e927458edda9b46aaaec6043d16d4a41b1e1876ba51d7fcc428886101218da6b
-
SSDEEP
12288:j7Zka1a8Lde/3ADOizU5WmpYshXZPbGwidNpg57:j7qa1a6e/mOizU5WmD9idNpO
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-